Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes Cisco IOS Release 12.2(44)SE1 and later
17
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
Resolved Caveats
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE3
• CSCee55603
An SNMP access-control list (ACL) now works correctly on virtual routing and forwarding (VRF)
interfaces.
• CSCso75052
An end host no longer remains in the guest VLAN after an IEEE 802.1x authentication.
• CSCsq71492
The switch no longer reloads with an address error if the TACACS+ server sends an authentication
error when the access control system is configured and a timeout request occurs.
• CSCsr55949
When IEEE 802.1x port-based authentication is enabled on the switch, Extensible Authentication
Protocol (EAP) notification packets from the supplicant are no longer discarded.
• CSCsu04337
In environments using Layer 2 IP Network Admission Control (NAC), long downloadable ACLs
(dACLs) with source or destination Layer 4 ports no longer cause unpredictable events in which all
traffic is dropped and URL redirects are not enforced.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE2
• CSCsg91027
When the logging event-spanning-tree interface configuration command is configured and logging
to the console is enabled, a topology change no longer generates a large number of logging
messages.
• CSCsl76599
The switch no longer unexpectedly reloads while configured with IEEE 802.1x authentication and
the MAC authentication bypass feature.
• CSCsl77063
When you enable detection of Cisco IP phones by entering the switchport voice detect cisco-phone
interface configuration command, the interface is no longer disabled if you connect a third-party IP
phone is connected to the interface.
Note This command was designed to work with Cisco IP phones; you should not enable it on
interfaces connected to third-party IP phones.
• CSCsl93313
When you configure a port channel as trusted by entering the ip dhcp snooping trust interface
configuration command, the configuration is no longer lost when the link goes from down to up.